Updates on the campus response to coronavirus (COVID-19)
Photo file: 
photograph of Angelos Keromytis
Full name: 
Angelos D Keromytis
Job title: 
; Georgia Research Alliance Eminent Scholar; Weitnauer Techn.Trans. Chr
Technical Interest Groups: Computer Systems and Software
Email address: 
Klaus 3362

Dr. Angelos D. Keromytis is Professor, John H. Weitnauer, Jr. Chair, and Georgia Research Alliance (GRA) Eminent Scholar at the Georgia Institute of Technology. His field of research is systems and network security, and applied cryptography.

He came to Georgia Tech from DARPA, where he served as Program Manager in the Information Innovation Office (I2O) from 2014 to 2018. During that time, he initiated five major research initiatives in cybersecurity and managed a portfolio of nine programs, and supervised technology transitions and partnerships with numerous elements of the Department of Defense, the Intelligence Community, Law Enforcement, and other parts of the U.S. government. For his work, he received the DAPRA Superior Public Service Medal, and the Results Matter Award. Prior to DARPA, he served as Program Director with the Computer and Network Systems Division in the Directorate for Computer and Information Science & Engineering (CISE) at the National Science Foundation (NSF), where he co-managed the Secure and Trustworthy Cyberspace (SaTC) program and helped initiate a number of cross-disciplinary and public-private programs. Prior to his public service tour, Dr. Keromytis was a faculty member with the Department of Computer Science at Columbia University, where he founded the Network Security Lab.

Dr. Keromytis is an elected Fellow of the ACM and the IEEE. He has 53 issued U.S. patents and over 250 refereed publications. His work has been cited over 20,000 times, with an h-index of 72 and i10-index of 229. He has founded two new technology ventures, StackSafe and Allure Security Technology. He received his Ph.D. (2001) and M.Sc. (1997) in Computer Science from the University of Pennsylvania, and his B.Sc. in Computer Science from the University of Crete, Greece. He is a certified PADI Master Instructor, with over 500 dives.

Research interests: 
  • Computer Network Operations
  • Computer and Network Security
  • Software Security
  • Access Control
  • Cryptographic Protocols
  • Privacy
  • John H. Weitnauer, Jr. Chair
  • GRA Eminent Scholar
  • IEEE Fellow, 2018
  • ACM Fellow, 2017
  • ACM Distinguished Scientist, 2012

"SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities" Theofilos Petsios, Jason Zhao, Angelos D. Keromytis, and Suman Jana. In Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS), pp. 2155 - 2168. October/November 2017, Dallas, TX. (Acceptance rate: 18%)

"Back in Black: Towards Formal, Black Box Analysis of Sanitizers and Filters" George Argyros, Ioannis Stais, Angelos D. Keromytis, and Aggelos Kiayias. In Proceedings of the 37th IEEE Symposium on Security and Privacy (S&P), pp. 91 - 109. May 2016, San Jose, CA. (Acceptance rate: 13.75%)

"I am Robot: (Deep) Learning to Break Semantic Image CAPTCHAs," Suphannee Sivakorn, Iasonas Polakis, and Angelos D. Keromytis. In Proceedings of the 1st IEEE European Symposium on Security and Privacy (EuroS&P), pp. 388 - 403. March 2016, Saabrucken, Germany. (Acceptance rate: 17.3%)

"The Spy in the Sandbox: Practical Cache Attacks in Javascript and their Implications" Yossef Oren, Vasileios P. Kemerlis, Angelos D. Keromytis, and Simha Sethumadhavan. In Proceedings of the 22nd ACM Conference on Computer and Communications Security (CCS), pp. 1406 - 1418. October 2015, Denver, CO. (Acceptance rate: 19.8%) [101 citations]

"Blind Seer: A Scalable Private DBMS," Vasilis Pappas, Fernando Krell, Binh Vo, Vladimir Kolesnikov, Tal Malkin, Seung Geol Choi, Wesley George, Angelos D. Keromytis, and Steven M. Bellovin. In Proceedings of the 35th IEEE Symposium on Security & Privacy (S&P), pp. 359 - 374. May 2014, San Jose, CA. (Acceptance rate: 13.5%) [122 citations]

"Transparent ROP Exploit Mitigation using Indirect Branch Tracing," Vasilis Pappas, Michalis Polychronakis, and Angelos D. Keromytis. In Proceedings of the 22nd USENIX Security Symposium, pp. 447 - 462. August 2013, Washington, DC. (Acceptance rate: 16.2%) [227 citations]

"Smashing the Gadgets: Hindering Return-Oriented Programming Using In-Place Code Randomization," Vasilis Pappas, Michalis Polychronakis, and Angelos D. Keromytis. In Proceedings of the 33rd IEEE Symposium on Security & Privacy (S&P), pp. 601 - 615. May 2012, San Francisco, CA. (Acceptance rate: 13%) [270 citations]

"A Comprehensive Survey of Voice over IP Security Research," Angelos D. Keromytis. In the IEEE Communications Surveys and Tutorials, vol. 14, no. 2, pp. 514 - 537, May 2012. [141 citations]

"libdft: Practical Dynamic Data Flow Tracking for Commodity Systems," Vasileios P. Kemerlis, Georgios Portokalidis, Kangkook Jee, and Angelos D. Keromytis. In Proceedings of the 8th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (VEE), pp. 121 - 132. March 2012, London, UK. [131 citations]

"ROP Payload Detection Using Speculative Code Execution," Michalis Polychronakis and Angelos D. Keromytis. In Proceedings of the 6th International Conference on Malicious and Unwanted Software (MALWARE), pp. 58 - 65. October 2011, Fajardo, PR. (Best Paper Award)

"ASSURE: Automatic Software Self-healing Using REscue points," Stelios Sidiroglou, Oren Laadan, Nico Viennot, Carlos-René Pérez, Angelos D. Keromytis, and Jason Nieh. In Proceedings of the 14th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), pp. 37 - 48. March 2009, Washington, DC. (Acceptance rate: 25.6%) [178 citations]

"On the Infeasibility of Modeling Polymorphic Shellcode," Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, and Salvatore J. Stolfo. In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS), pp. 541 - 551. October/November 2007, Alexandria, VA. (Acceptance rate: 18.1%) [138 citations]

"Building a Reactive Immune System for Software Services," Stelios Sidiroglou, Michael E. Locasto, Stephen W. Boyd, and Angelos D. Keromytis. In Proceedings of the USENIX Annual Technical Conference, pp. 149 - 161. April 2005, Anaheim, CA. (Acceptance rate: 20.3%) [220 citations]

"Countering Code-Injection Attacks With Instruction-Set Randomization," Gaurav S. Kc, Angelos D. Keromytis, and Vassilis Prevelakis. In Proceedings of the 10th ACM International Conference on Computer and Communications Security (CCS), pp. 272 - 280. October 2003, Washington, DC. (Acceptance rate: 13.8%) (ACM CCS 2013 Test of Time Award) [700 citations]

"Secure Overlay Services," Angelos D. Keromytis, Vishal Misra, and Dan Rubenstein. In Proceedings of the ACM SIGCOMM Conference, pp. 61 - 72. August 2002, Pittsburgh, PA. Also available through the ACM Computer Communications Review (SIGCOMM Proceedings), vol. 32, no. 4, October 2002. (Acceptance rate: 8.3%) [710 citations]

"Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols," William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, and Omer Reingold. In Proceedings of the 9th ACM International Conference on Computer and Communications Security (CCS), pp. 48 - 58. November 2002, Washington, DC. (Acceptance rate: 17.6%) [140 citations]

"Implementing a Distributed Firewall," Sotiris Ioannidis, Angelos D. Keromytis, Steven M. Bellovin, and Jonathan M. Smith. In Proceedings of the 7th ACM International Conference on Computer and Communications Security (CCS), pp. 190 - 199. November 2000, Athens, Greece. (Acceptance rate: 21.4%) [687 citations]

"The KeyNote Trust-Management System, Version 2," Matt Blaze, Joan Feigenbaum, John Ioannidis, and Angelos D. Keromytis. Request For Comments (RFC) 2704, September 1999. [1062 citations]

Last revised February 1, 2023